Home | Amazing | Today | Tags | Publishers | Years | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Hands-On Networking with Azure: Build large-scale, real-world apps using Azure networking solutions
Hands-On Networking with Azure: Build large-scale, real-world apps using Azure networking solutions

A step-by-step guide to get you up and running with Azure Networking Services and help you build solutions that leverage effective design patterns

Key Features

  • Learn best practices for designing and implementing Azure Networking for Azure VMs
  • Figure out the hidden secrets...
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Beginning Bazel: Building and Testing for Java, Go, and More
Beginning Bazel: Building and Testing for Java, Go, and More
Discover Bazel, a new build and software test set of tools for today's programmers and developers.  This book shows you how to speed up your builds and tests, and how to use Bazel in the context of your favorite programming language. You'll see that the languages and SDKs supported include Java, Android, iOS, and...
Introducing Azure Kubernetes Service: A Practical Guide to Container Orchestration
Introducing Azure Kubernetes Service: A Practical Guide to Container Orchestration
This book is a practical guide to Microsoft’s Azure Kubernetes Service (AKS), a container orchestration platform. The goal of this book is to take the reader from 0 to 100 deploying and running a Kubernetes cluster on Microsoft Azure cloud. For anyone embarking on this book, it is ideal to have experience in the...
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

Raspbian OS Programming with the Raspberry Pi: IoT Projects with Wolfram, Mathematica, and Scratch
Raspbian OS Programming with the Raspberry Pi: IoT Projects with Wolfram, Mathematica, and Scratch
Master the command line and Raspbian Linux as well as the physical connections of the Pi. With this book you’ll develop skills applicable to other real world applications in both hardware and software development all while working on simple and fun IoT projects that you can do yourself.

You'll learn to build
...
Python, PyGame, and Raspberry Pi Game Development
Python, PyGame, and Raspberry Pi Game Development

Expand your basic knowledge of Python and use PyGame to create fast-paced video games with great graphics and sounds. This second edition shows how you can integrate electronic components with your games using the build-in general purpose input/output (GPIO) pins and some Python code to create two new games. 

...

Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to...
Beginning Programming Using Retro Computing: Learn BASIC with a Commodore Emulator
Beginning Programming Using Retro Computing: Learn BASIC with a Commodore Emulator

Learn programming using the Commodore 16/Plus 4 system. Following this book, you and your children will not only learn BASIC programming, but also have fun emulating a retro Commodore system. There are many ways to bring the fun of learning to program in the 1980s back to life. For example, downloading the VICE emulator to a...

Developing Games on the Raspberry Pi: App Programming with Lua and LÖVE
Developing Games on the Raspberry Pi: App Programming with Lua and LÖVE

Learn to set up a Pi-based game development environment, and then develop a game with Lua, a popular scripting language used in major game frameworks like Unreal Engine (BioShock Infinite), CryEngine (Far Cry series), Diesel (Payday: The Heist), Silent Storm Engine (Heroes of Might and Magic V) and many others. More importantly,...

DB2 Express-c: The Developer Handbook for Xml, Php, C/c++, Java, and .net
DB2 Express-c: The Developer Handbook for Xml, Php, C/c++, Java, and .net
This IBM® Redbook will help you get started in application development with XML, PHP, C/C++, Java™, and .NET using the free IBM database management system offering DB2® Express-C V9. This book is organized as follows:

* Chapter 1
...
Result Page: 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy